A - Z Guide For SSH Keys (Understanding SSH Keys)
SSH keys are actually the set of keys used to safeguard the network from intruders. SSH stands for Secure Socket Shell, in a simple language it is also known as Secure Shell. These pairs of keys work on the SSH protocol. SSH protocol was developed after a scenario of trespassing was observed on a network system.
SSH Protocol was developed in 1995 by Tatu Ylonen. The main idea behind introducing the SSH Protocol was to protect the servers from attackers who try to make an attempt to gain access to your network with the help of usernames and passwords. And so just to make sure that no one steps in your network area without proper authentication SSH keys are developed. The main function of these keys is to provide users with secure private network transactions from both ends, whether being client-side or server-side.
SSH keys are mostly used for allowing single sign-in only at one time. These pairs of keys are used for managing networks, operating systems, and configurations.SSH keys work by following the mechanism of the resemblance of passwords.
WORKING OF SSH KEYS
SSH keys work on the client-server model, where the client-side requires remote access to the network system with a proper password and authenticated username. There are two phases for setting up or we can say to work with SSH keys and they are -
Phase 1 - Shared Secret Generation
Phase 2 - Authentication of the client
In phase 1, a proposal is sent by the client where both parties agree to set up the protocol and start with the encryption. After that server provides its client with the public key. Later on, after it, a session key is automatically generated during the process and it is shared with both the ends to encrypt the whole session.
In phase 2, the server authenticates the client after he/she receives an encrypted password. Then the authentication process for the SSH keys begins with the client informing the server about the credentials.
USING SSH KEYS FOR ORGANISATION
Definitely, there are somewhat of risks for suing SSH keys for your servers, but that can be managed well by applying best practices for the keys management and some of these practices are as follows :
Obtain visibility
Rotate keys
Audit and enforce policy
Avoid hard coding for keys
Comments
Post a Comment